US7181580B2 - Secure pointers - Google Patents

Secure pointers Download PDF

Info

Publication number
US7181580B2
US7181580B2 US10/401,252 US40125203A US7181580B2 US 7181580 B2 US7181580 B2 US 7181580B2 US 40125203 A US40125203 A US 40125203A US 7181580 B2 US7181580 B2 US 7181580B2
Authority
US
United States
Prior art keywords
pointer
address
entry
target
storage location
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Expired - Fee Related, expires
Application number
US10/401,252
Other versions
US20040193814A1 (en
Inventor
Kevin J. Erickson
Richard K. Kirkman
Patrick J. McCarthy
Scott A. Plaetzer
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
International Business Machines Corp
Original Assignee
International Business Machines Corp
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by International Business Machines Corp filed Critical International Business Machines Corp
Priority to US10/401,252 priority Critical patent/US7181580B2/en
Assigned to INTERNATIONAL BUSINESS MACHINES CORPORATION reassignment INTERNATIONAL BUSINESS MACHINES CORPORATION ASSIGNMENT OF ASSIGNORS INTEREST (SEE DOCUMENT FOR DETAILS). Assignors: ERICKSON, KEVIN J., MCCARTHY, PATRICK J., PLAETZER, SCOTT A., KIRKMAN, RICHARD K.
Publication of US20040193814A1 publication Critical patent/US20040193814A1/en
Application granted granted Critical
Publication of US7181580B2 publication Critical patent/US7181580B2/en
Adjusted expiration legal-status Critical
Expired - Fee Related legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/52Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems during program execution, e.g. stack integrity ; Preventing unwanted data erasure; Buffer overflow
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F12/00Accessing, addressing or allocating within memory systems or architectures
    • G06F12/14Protection against unauthorised use of memory or access to memory
    • G06F12/1458Protection against unauthorised use of memory or access to memory by checking the subject access rights
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2105Dual mode as a secondary aspect

Definitions

  • This invention relates generally to computers and more particularly to the security of pointers in computers.
  • Computers are increasingly becoming interconnected because users desire to access information stored at remote locations. This interconnection gives unauthorized persons the opportunity to access computers that are thousands of miles away. This unauthorized access may take the form of potentially destructive code, often called computer viruses, worms, or Trojan horses.
  • This destructive code can attack a computer is by altering pointers within the computer, which the destructive code may then use to access or alter the contents of critical system data or resources.
  • a pointer is a storage location in computer memory that contains the address of, or points to, another storage location.
  • the concept of pointers may be understood by referring to FIG. 1 , which illustrates a block diagram of typical pointers in memory 100 .
  • Pointer 101 is at storage location having an address of &A within computer memory and contains &B, which is the address of another storage location, which contains a target 110 .
  • &B which is the address of another storage location, which contains a target 110 .
  • the pointer 101 contains the address of the target 110 , so the pointer 101 is said to point at the target 110 .
  • a legitimate copy of a pointer appears identical to the original pointer, except that the legitimate copy is located at a different address.
  • the pointer 102 at address &C which also contains &B, also points at the target 110 and represents a legitimate copy of the pointer 101 .
  • the pointer 103 is an illegitimate copy of pointer 101 in that the original contents of the pointer 101 (&B) have been replaced with a new contents (&E), so that the pointer 103 now points at the duped target 115 at address &E.
  • the duped target 115 may have a legitimate address for the executing code thread to access, using an illegitimate pointer to access or alter the contents at that address as if it were the target 110 at address &B may cause data corruption or integrity problems.
  • a method, apparatus, system, and signal-bearing medium are provided that in an embodiment map a pointer to a target indirectly via a pointer map.
  • the pointer map is stored in a reserved area and an entry for the pointer in the pointer map includes a back-pointer containing an address of the pointer and a target-address containing the address of the target.
  • the pointer is checked to ensure its contents point at the entry in the pointer map in the reserved area and that the back-pointer in the pointer map entry points back at the pointer. In this way, pointers are protected from being modified illegitimately.
  • FIG. 1 depicts a block diagram of typical pointers.
  • FIG. 2 depicts a block diagram of an example system for implementing an embodiment of the invention.
  • FIG. 3 depicts a block diagram of an example data structure, according to an embodiment of the invention.
  • FIG. 4 depicts a flowchart of example processing for creating a pointer, according to an embodiment of the invention.
  • FIG. 5 depicts a flowchart of example processing for accessing a pointer, according to an embodiment of the invention.
  • FIG. 6 depicts a flowchart of example processing for determining the validity of a pointer, according to an embodiment of the invention.
  • FIG. 2 depicts a block diagram of an example system 200 for implementing an embodiment of the invention.
  • the system 200 includes an electronic device 202 connected to a network 205 . Although only one electronic device 202 and one network 205 are shown, in other embodiments any number or combination of them may be present. In another embodiment, the network 205 is not present.
  • the electronic device 202 includes a processor 210 , a storage device 215 , an input device 220 , and an output device 221 , all connected directly or indirectly via a bus 225 .
  • the processor 210 represents a central processing unit of any type of architecture, such as a CISC (Complex Instruction Set Computing), RISC (Reduced Instruction Set Computing), VLIW (Very Long Instruction Word), or a hybrid architecture, although any appropriate processor may be used.
  • the processor 210 executes instructions and includes that portion of the electronic device 202 that controls the operation of the entire electronic device.
  • the processor 210 typically includes a control unit that organizes data and program storage in memory and transfers data and other information between the various parts of the electronic device 202 .
  • the processor 210 reads and/or stores code and data to/from the storage device 215 , the network 205 , and/or the input device 220 .
  • the electronic device 202 is shown to contain only a single processor 210 and a single bus 225 , the present invention applies equally to electronic devices that may have multiple processors and multiple buses with some or all performing different functions in different ways.
  • the storage device 215 represents one or more mechanisms for storing data.
  • the storage device 215 may include read only memory (ROM), random access memory (RAM), magnetic disk storage media, optical storage media, flash memory devices, and/or other machine-readable media.
  • ROM read only memory
  • RAM random access memory
  • magnetic disk storage media magnetic disk storage media
  • optical storage media magnetic tape
  • flash memory devices any appropriate type of storage device may be used.
  • any appropriate type of storage device may be used.
  • only one storage device 215 is shown, multiple storage devices and multiple types of storage devices may be present.
  • the electronic device 202 is drawn to contain the storage device 215 , it may be distributed across other electronic devices, such as devices connected to the network 205 .
  • the storage device 215 includes a protected area 226 and code 240 .
  • the protected area is protected by the processor 210 , such that the protected area can only be accessed (read or written to) by instructions executing on the processor 210 when the processor 210 is in privileged mode.
  • Privileged mode is a processing mode designed for operating system components and hardware-manipulating drivers.
  • privileged mode allows direct access to hardware and all memory.
  • An alternative to privileged mode is user mode, which is a restricted processing mode designed for applications, environment subsystems, and integral subsystems. Privileged mode is also called master mode or supervisory mode.
  • the instructions that execute in privileged mode are often called the kernel.
  • the purpose of separating the privileged and unprivileged (user) modes is to prevent untrusted components from executing instructions or accessing memory that would compromise system security. For example, in an embodiment an attempted execution of such an instruction in the unprivileged mode alerts the operating system, which may result in the offending program's termination.
  • the protected area 226 includes a pointer controller 232 and a reserved area 228 .
  • the reserved area 228 includes a pointer map data structure 230 .
  • the reserved area 228 may also include other objects.
  • the pointer controller 232 is system code within the protected area 226 that controls the creation and access of pointers using the pointer map 230 .
  • the pointer controller 232 includes instructions capable of executing on the processor 210 to carry out the functions as further described below with reference to FIGS. 3–6 .
  • the pointer controller 232 may be implemented in hardware via logic gates and/or other appropriate hardware techniques.
  • the reserved area 228 is an address range in the storage device 215 that the pointer controller 232 sets aside for the pointer map 230 .
  • the pointer controller 232 ensures that pointers point to valid addresses within the pointer map data structure 230 within the reserved area 228 , as further described below with reference to FIG. 6 .
  • the pointer map 230 is a data structure used in an embodiment of the invention to prevent any code other than privileged system code in the protected area 226 from constructing a valid pointer.
  • the pointer map 230 features a double dereferencing mechanism that offers protection from duping attacks. Although only one pointer map data structure 230 is shown, in another embodiment multiple data structures may exist, e.g., one pointer map for each process.
  • the pointer map data structure 230 is further described below with reference to FIG. 3 .
  • the code 240 includes executable or interpretable instructions that desire to create or access a pointer.
  • the code 240 may be part of the operating system of the electronic device 202 , may be an application, or may be any other type of code.
  • the code 240 may have been loaded into the storage device 215 from the input device 220 , from the network 205 , or from any other appropriate origin.
  • the input device 220 may be a keyboard, mouse or other pointing device, trackball, touchpad, touchscreen, keypad, microphone, voice recognition device, or any other appropriate mechanism for the user to input data to the electronic device 202 . Although only one input device 220 is shown, in another embodiment any number and type of input devices may be present.
  • the output device 221 is that part of the electronic device 202 that presents output to the user.
  • the output device 221 may be a cathode-ray tube (CRT) based video display well known in the art of computer hardware. But, in other embodiments the output device 221 may be replaced with a liquid crystal display (LCD) based or gas, plasma-based, flat-panel display. In still other embodiments, any appropriate display device may be used. In other embodiments, a speaker or a printer may be used. In other embodiments any appropriate output device may be used. Although only one output device 221 is shown, in other embodiments, any number of output devices of different types or of the same type may be present.
  • CTR cathode-ray tube
  • the bus 225 may represent one or more busses, e.g., PCI, ISA (Industry Standard Architecture), X-Bus, EISA (Extended Industry Standard Architecture), or any other appropriate bus and/or bridge (also called a bus controller).
  • PCI Peripheral Component Interconnect Express
  • ISA Industry Standard Architecture
  • X-Bus Universal Serial Bus
  • EISA Extended Industry Standard Architecture
  • bus controller any other appropriate bus and/or bridge
  • the electronic device 202 may be implemented using any suitable hardware and/or software, such as a personal computer.
  • Portable computers, laptop or notebook computers, PDAs (Personal Digital Assistants), pocket computers, telephones, pagers, automobiles, teleconferencing systems, appliances, and mainframe computers are examples of other possible configurations of the electronic device 202 .
  • the hardware and software depicted in FIG. 2 may vary for specific applications and may include more or fewer elements than those depicted.
  • other peripheral devices such as audio adapters, or chip programming devices, such as EPROM (Erasable Programmable Read-Only Memory) programming devices may be used in addition to or in place of the hardware already depicted.
  • EPROM Erasable Programmable Read-Only Memory
  • the network 205 may be any suitable network or combination of networks and may support any appropriate protocol suitable for communication of data and/or code to/from the electronic device 202 .
  • the network 205 may represent a storage device or a combination of storage devices, either connected directly or indirectly to the electronic device 202 .
  • the network 205 may support Infiniband.
  • the network 205 may support wireless communications.
  • the network 205 may support hard-wired communications, such as a telephone line or cable.
  • the network 205 may support the Ethernet IEEE (Institute of Electrical and Electronics Engineers) 802.3x specification.
  • the network 205 may be the Internet and may support IP (Internet Protocol).
  • the network 205 may be a local area network (LAN) or a wide area network (WAN). In another embodiment, the network 205 may be a hotspot service provider network. In another embodiment, the network 205 may be an intranet. In another embodiment, the network 205 may be a GPRS (General Packet Radio Service) network. In another embodiment, the network 205 may be any appropriate cellular data network or cell-based radio network technology. In another embodiment, the network 205 may be an IEEE 802.11B wireless network. In still another embodiment, the network 205 may be any suitable network or combination of networks. Although one network 205 is shown, in other embodiments any number of networks (of the same or different types) may be present.
  • LAN local area network
  • WAN wide area network
  • the network 205 may be a hotspot service provider network.
  • the network 205 may be an intranet.
  • the network 205 may be a GPRS (General Packet Radio Service) network.
  • the network 205 may be any appropriate cellular data network or cell-
  • aspects of an embodiment of the invention pertain to specific apparatus and method elements implementable on an electronic device.
  • the invention may be implemented as a program product for use with an electronic device.
  • the programs defining the functions of this embodiment may be delivered to the electronic device via a variety of signal-bearing media, which include, but are not limited to:
  • a non-rewriteable storage medium e.g., a read-only memory device attached to or within an adapter or electronic device, such as a CD-ROM readable by a CD-ROM drive;
  • alterable information stored on a rewriteable storage medium e.g., a hard disk drive or diskette;
  • a communications medium such as through a computer or a telephone network, e.g., the network 205 , including wireless communications.
  • Such signal-bearing media when carrying machine-readable instructions that direct the functions of the present invention, represent embodiments of the present invention.
  • FIG. 3 depicts a block diagram of the use of an example pointer-map data structure 230 , according to an embodiment of the invention.
  • the pointer-map 230 is stored in a reserved area of a protected area, which prohibits any code other than the code operating in privileged mode from constructing a valid pointer.
  • the pointer map 230 features a double-dereferencing mechanism that offers protection from duping attacks because it is accessible by the pointer controller 232 and is not accessible to non-privileged code.
  • a system call is made to set up a pointer-map entry for the pointer being created.
  • the pointer-map entry serves as a protection agent that allows the system to isolate the actual pointer and its target object, thus preventing modified pointers from directly accessing unauthorized storage. This protection is achieved through the combination of several validation mechanisms that occur during pointer dereferencing, as further described below.
  • a pointer is constructed as a group of bytes that contains an address.
  • An example of a pointer is the pointer 330 located at address &A.
  • the target of the pointer 330 is the target 350 at address &B, but the pointer 330 does not point directly at the target 350 . That is, the storage location at address &A does not contain &B (the address of the target 350 ). Instead, the storage location for the pointer 330 at address &A points at an entry 305 in the pointer map 230 at address &X, which was established for the pointer 330 when the pointer 330 was created.
  • the entry 305 contains the actual address of the target object at address &B in a target-address field 315 . Thus, the contents of the entry 305 in the pointer map data structure 230 are used to actually access the target object 350 .
  • the entries in the pointer map 230 also include the address of the pointer to which they are associated, e.g., the entry 305 also includes a back-pointer field 316 , which points back at its associated pointer 330 .
  • the back-pointer prevents code from altering a pointer to point elsewhere in the pointer map 230 and accessing an object that the code should be restricted from accessing.
  • the pointer map 230 is contained with a range of reserved addresses that only privileged system code, such as the pointer controller 232 , can alter.
  • the dereferencing mechanism of the pointer controller 232 not only checks to ensure that the back-pointer matches the address of the pointer being dereferenced, the pointer controller 232 also checks to ensure that the pointer points to a legitimate pointer map entry in the reserved address area range 228 , as further described below with reference to FIG. 6 .
  • the process of making a legitimate copy of a pointer is much the same as creating an original pointer.
  • the pointer 335 at address &C represents a legitimate copy of the pointer 330 . Since each pointer has its own entry in the pointer map 230 to prevent counterfeiting and ensure pointer validity, the pointer 335 contains &Y, which points to the entry 310 , which is separate from the entry 305 for the pointer 330 .
  • the entry 310 has a back-pointer field 321 that points back at the pointer 335 and a target-address field 320 , which points at the same target 350 as did the pointer 330 .
  • the back-pointer field 321 contains &C, which is the address of the pointer 335
  • the target-address field 320 contains &B, which is the address of the target 350 .
  • Pointer 340 at address &E which contains address &X that points at entry 305 , is an illegitimate pointer.
  • attempts to construct and use an illegitimate pointer 340 are foiled by an embodiment of the invention because the pointer map entry 305 only points back to the original pointer 330 at address &A and not at the illegitimate pointer 340 at address &E, thus causing the dereferencing of the pointer 340 to fail the back-pointer check.
  • the back-pointer check is further described below with reference to FIG. 6 .
  • the pointer map 230 may also include control information 325 within each entry.
  • the pointer controller 232 uses the control information 325 to further restrict the use of a pointer based on the permissions or attributes of the task that is executing the code 240 .
  • the pointer controller 232 uses the control information 325 to decide which attributes are required for pointer usage, such as context, process, local/global scope, and profile, although in other embodiments any appropriate attributes may be used.
  • the pointer controller 232 uses the control information 325 for storage protection and security means, for example, to verify that access to storage is not exceeding the size of the storage accessible by the pointer.
  • FIG. 3 shows control information 325 , in another embodiment, the control information 325 is optional, not used, or not present.
  • the pointer map 230 also contains an administrate control area 360 , which the pointer controller 232 uses to manage the creation, recycling, and reuse of pointer map entries such that the pointer map 230 is efficiently utilized.
  • the pointer controller 232 uses a garbage collection technique to recycle entries in the pointer map 230 .
  • FIG. 4 depicts a flowchart of example processing for creating a pointer, according to an embodiment of the invention.
  • Control begins at block 400 .
  • Control then continues to block 405 where the pointer controller 232 receives an address of a pointer to be created, an address of a target to be pointed to by the pointer from the code 240 , and optional control information.
  • pointers were previously described above with reference to FIG. 3 as pointers 330 , 335 , and 340 having respective addresses &A, &C, and &E.
  • An example of a target was previously describe above with reference to FIG. 3 as target 350 having an address of &B.
  • control continues to block 410 where the pointer controller 232 creates an entry associated with the address of the pointer received at block 405 in the pointer map data structure 230 using information from the administrative control area 360 . Examples of the entry were previously described above with reference to FIG. 3 as entries 305 and 310 .
  • Control then continues to block 415 where the pointer controller 232 stores the address of the target in the target-address field in the created entry in the pointer map 230 .
  • Examples of the target-address fields were previously described above with reference to FIG. 3 as fields 315 and 320 .
  • Examples of the back-pointer fields were previously described above with reference to FIG. 3 as fields 316 and 321 .
  • Control then continues to block 422 where the pointer controller 232 optionally stores control information in the control information field 325 .
  • the control information 325 may include requirements that a subsequent access of the pointer will need to meet in order to use the pointer.
  • the control information 325 may include process, context, profile, and/or local/global scope information, which will be subsequently checked when the pointer is accessed. In other embodiments, any appropriate attribute information may be used.
  • Control then continues to block 425 where the pointer controller 232 stores the address of the entry in the location pointed to by the address of the pointer.
  • the pointer controller 232 stores &X at address &A or stores &Y at address &C.
  • the pointer points at the entry in the pointer map 230 and does not point directly at the target, but instead uses the entry in the pointer map 230 to access the target indirectly.
  • FIG. 5 depicts a flowchart of example processing for accessing a pointer, according to an embodiment of the invention. Control begins at block 500 .
  • Control then continues to block 510 where the pointer controller 232 determines whether the pointer is valid, as further described below with reference to FIG. 6 . If the determination at block 510 is false, then control continues to block 598 where the pointer controller 232 returns an error to the invoking code 240 .
  • control continues to block 515 where the pointer controller 232 accesses the entry in the pointer map 230 associated with the pointer.
  • Control then continues to block 520 where the pointer controller 232 determines whether the attributes in the control information 325 are satisfied or not used. For example, if the attributes indicate that only a specified process may access the pointer, the pointer controller 232 determines whether the invoking code 240 is part of that specified process. In other embodiments, the pointer controller 232 determines whether any of the attributes previously described above with reference to FIG. 3 are met.
  • control continues to block 598 where the pointer controller 232 returns an error to the invoking code 240 .
  • control continues to block 525 where the pointer controller 232 retrieves the address of the target from the target-address field in the entry in the pointer map 230 .
  • Examples of the target-address field are shown as reference numerals 315 and 320 in FIG. 3 .
  • Control then continues to block 599 where the pointer controller 232 returns the address of the target to the invoking code 240 .
  • FIG. 6 depicts a flowchart of example processing for determining the validity of a pointer, according to an embodiment of the invention. Control begins at block 600 .
  • the pointer controller 232 determines whether &X is an address of the entry 305 within the reserved address range. If the determination at block 610 is false, then control continues to block 698 where the pointer controller 232 returns an indication that the pointer is invalid.

Abstract

A method, apparatus, system, and signal-bearing medium that in an embodiment map a pointer to a target indirectly via a pointer map. In an embodiment, the pointer map is stored in a reserved area and an entry for the pointer in the pointer map includes a back-pointer containing an address of the pointer and a target-address containing the address of the target. When the pointer is accessed, the pointer is checked to ensure its contents point at the entry in the pointer map in the reserved area and that the back-pointer in the pointer map entry points back at the pointer. In this way, pointers are protected from being modified illegitimately.

Description

LIMITED COPYRIGHT WAIVER
A portion of the disclosure of this patent document contains material to which the claim of copyright protection is made. The copyright owner has no objection to the facsimile reproduction by any person of the patent document or the patent disclosure, as it appears in the U.S. Patent and Trademark Office file or records, but reserves all other rights whatsoever.
FIELD
This invention relates generally to computers and more particularly to the security of pointers in computers.
BACKGROUND
Computers are increasingly becoming interconnected because users desire to access information stored at remote locations. This interconnection gives unauthorized persons the opportunity to access computers that are thousands of miles away. This unauthorized access may take the form of potentially destructive code, often called computer viruses, worms, or Trojan horses. One way that this destructive code can attack a computer is by altering pointers within the computer, which the destructive code may then use to access or alter the contents of critical system data or resources.
A pointer is a storage location in computer memory that contains the address of, or points to, another storage location. The concept of pointers may be understood by referring to FIG. 1, which illustrates a block diagram of typical pointers in memory 100. Pointer 101 is at storage location having an address of &A within computer memory and contains &B, which is the address of another storage location, which contains a target 110. Thus, the pointer 101 contains the address of the target 110, so the pointer 101 is said to point at the target 110.
A legitimate copy of a pointer appears identical to the original pointer, except that the legitimate copy is located at a different address. Thus, the pointer 102 at address &C, which also contains &B, also points at the target 110 and represents a legitimate copy of the pointer 101.
But, the pointer 103 is an illegitimate copy of pointer 101 in that the original contents of the pointer 101 (&B) have been replaced with a new contents (&E), so that the pointer 103 now points at the duped target 115 at address &E. Although the duped target 115 may have a legitimate address for the executing code thread to access, using an illegitimate pointer to access or alter the contents at that address as if it were the target 110 at address &B may cause data corruption or integrity problems.
What is needed is a way to enhance system security to protect the computer from accessing and/or altering incorrect storage locations. Although the aforementioned problems have been described in terms of unauthorized persons attempting to defeat system security measures, the problem of incorrect storage locations may have any cause whether intentional or inadvertent. Further, destructive code may be loaded onto the computer via any mechanism not limited to interconnected computers.
SUMMARY
A method, apparatus, system, and signal-bearing medium are provided that in an embodiment map a pointer to a target indirectly via a pointer map. In an embodiment, the pointer map is stored in a reserved area and an entry for the pointer in the pointer map includes a back-pointer containing an address of the pointer and a target-address containing the address of the target. When the pointer is accessed, the pointer is checked to ensure its contents point at the entry in the pointer map in the reserved area and that the back-pointer in the pointer map entry points back at the pointer. In this way, pointers are protected from being modified illegitimately.
BRIEF DESCRIPTION OF THE DRAWINGS
FIG. 1 depicts a block diagram of typical pointers.
FIG. 2 depicts a block diagram of an example system for implementing an embodiment of the invention.
FIG. 3 depicts a block diagram of an example data structure, according to an embodiment of the invention.
FIG. 4 depicts a flowchart of example processing for creating a pointer, according to an embodiment of the invention.
FIG. 5 depicts a flowchart of example processing for accessing a pointer, according to an embodiment of the invention.
FIG. 6 depicts a flowchart of example processing for determining the validity of a pointer, according to an embodiment of the invention.
DETAILED DESCRIPTION
FIG. 2 depicts a block diagram of an example system 200 for implementing an embodiment of the invention. The system 200 includes an electronic device 202 connected to a network 205. Although only one electronic device 202 and one network 205 are shown, in other embodiments any number or combination of them may be present. In another embodiment, the network 205 is not present.
The electronic device 202 includes a processor 210, a storage device 215, an input device 220, and an output device 221, all connected directly or indirectly via a bus 225. The processor 210 represents a central processing unit of any type of architecture, such as a CISC (Complex Instruction Set Computing), RISC (Reduced Instruction Set Computing), VLIW (Very Long Instruction Word), or a hybrid architecture, although any appropriate processor may be used. The processor 210 executes instructions and includes that portion of the electronic device 202 that controls the operation of the entire electronic device. Although not depicted in FIG. 2, the processor 210 typically includes a control unit that organizes data and program storage in memory and transfers data and other information between the various parts of the electronic device 202. The processor 210 reads and/or stores code and data to/from the storage device 215, the network 205, and/or the input device 220.
Although the electronic device 202 is shown to contain only a single processor 210 and a single bus 225, the present invention applies equally to electronic devices that may have multiple processors and multiple buses with some or all performing different functions in different ways.
The storage device 215 represents one or more mechanisms for storing data. For example, the storage device 215 may include read only memory (ROM), random access memory (RAM), magnetic disk storage media, optical storage media, flash memory devices, and/or other machine-readable media. In other embodiments, any appropriate type of storage device may be used. Although only one storage device 215 is shown, multiple storage devices and multiple types of storage devices may be present. Further, although the electronic device 202 is drawn to contain the storage device 215, it may be distributed across other electronic devices, such as devices connected to the network 205.
The storage device 215 includes a protected area 226 and code 240. The protected area is protected by the processor 210, such that the protected area can only be accessed (read or written to) by instructions executing on the processor 210 when the processor 210 is in privileged mode.
Privileged mode is a processing mode designed for operating system components and hardware-manipulating drivers. In an embodiment, privileged mode allows direct access to hardware and all memory. An alternative to privileged mode is user mode, which is a restricted processing mode designed for applications, environment subsystems, and integral subsystems. Privileged mode is also called master mode or supervisory mode. The instructions that execute in privileged mode are often called the kernel. The purpose of separating the privileged and unprivileged (user) modes is to prevent untrusted components from executing instructions or accessing memory that would compromise system security. For example, in an embodiment an attempted execution of such an instruction in the unprivileged mode alerts the operating system, which may result in the offending program's termination.
The protected area 226 includes a pointer controller 232 and a reserved area 228. The reserved area 228 includes a pointer map data structure 230. In another embodiment, the reserved area 228 may also include other objects. The pointer controller 232 is system code within the protected area 226 that controls the creation and access of pointers using the pointer map 230. In an embodiment, the pointer controller 232 includes instructions capable of executing on the processor 210 to carry out the functions as further described below with reference to FIGS. 3–6. In another embodiment, the pointer controller 232 may be implemented in hardware via logic gates and/or other appropriate hardware techniques.
The reserved area 228 is an address range in the storage device 215 that the pointer controller 232 sets aside for the pointer map 230. In an embodiment, the pointer controller 232 ensures that pointers point to valid addresses within the pointer map data structure 230 within the reserved area 228, as further described below with reference to FIG. 6.
The pointer map 230 is a data structure used in an embodiment of the invention to prevent any code other than privileged system code in the protected area 226 from constructing a valid pointer. The pointer map 230 features a double dereferencing mechanism that offers protection from duping attacks. Although only one pointer map data structure 230 is shown, in another embodiment multiple data structures may exist, e.g., one pointer map for each process. The pointer map data structure 230 is further described below with reference to FIG. 3.
The code 240 includes executable or interpretable instructions that desire to create or access a pointer. The code 240 may be part of the operating system of the electronic device 202, may be an application, or may be any other type of code. The code 240 may have been loaded into the storage device 215 from the input device 220, from the network 205, or from any other appropriate origin.
The input device 220 may be a keyboard, mouse or other pointing device, trackball, touchpad, touchscreen, keypad, microphone, voice recognition device, or any other appropriate mechanism for the user to input data to the electronic device 202. Although only one input device 220 is shown, in another embodiment any number and type of input devices may be present.
The output device 221 is that part of the electronic device 202 that presents output to the user. The output device 221 may be a cathode-ray tube (CRT) based video display well known in the art of computer hardware. But, in other embodiments the output device 221 may be replaced with a liquid crystal display (LCD) based or gas, plasma-based, flat-panel display. In still other embodiments, any appropriate display device may be used. In other embodiments, a speaker or a printer may be used. In other embodiments any appropriate output device may be used. Although only one output device 221 is shown, in other embodiments, any number of output devices of different types or of the same type may be present.
The bus 225 may represent one or more busses, e.g., PCI, ISA (Industry Standard Architecture), X-Bus, EISA (Extended Industry Standard Architecture), or any other appropriate bus and/or bridge (also called a bus controller).
The electronic device 202 may be implemented using any suitable hardware and/or software, such as a personal computer. Portable computers, laptop or notebook computers, PDAs (Personal Digital Assistants), pocket computers, telephones, pagers, automobiles, teleconferencing systems, appliances, and mainframe computers are examples of other possible configurations of the electronic device 202. The hardware and software depicted in FIG. 2 may vary for specific applications and may include more or fewer elements than those depicted. For example, other peripheral devices such as audio adapters, or chip programming devices, such as EPROM (Erasable Programmable Read-Only Memory) programming devices may be used in addition to or in place of the hardware already depicted.
The network 205 may be any suitable network or combination of networks and may support any appropriate protocol suitable for communication of data and/or code to/from the electronic device 202. In various embodiments, the network 205 may represent a storage device or a combination of storage devices, either connected directly or indirectly to the electronic device 202. In an embodiment, the network 205 may support Infiniband. In another embodiment, the network 205 may support wireless communications. In another embodiment, the network 205 may support hard-wired communications, such as a telephone line or cable. In another embodiment, the network 205 may support the Ethernet IEEE (Institute of Electrical and Electronics Engineers) 802.3x specification. In another embodiment, the network 205 may be the Internet and may support IP (Internet Protocol). In another embodiment, the network 205 may be a local area network (LAN) or a wide area network (WAN). In another embodiment, the network 205 may be a hotspot service provider network. In another embodiment, the network 205 may be an intranet. In another embodiment, the network 205 may be a GPRS (General Packet Radio Service) network. In another embodiment, the network 205 may be any appropriate cellular data network or cell-based radio network technology. In another embodiment, the network 205 may be an IEEE 802.11B wireless network. In still another embodiment, the network 205 may be any suitable network or combination of networks. Although one network 205 is shown, in other embodiments any number of networks (of the same or different types) may be present.
As will be described in detail below, aspects of an embodiment of the invention pertain to specific apparatus and method elements implementable on an electronic device. In another embodiment, the invention may be implemented as a program product for use with an electronic device. The programs defining the functions of this embodiment may be delivered to the electronic device via a variety of signal-bearing media, which include, but are not limited to:
(1) information permanently stored on a non-rewriteable storage medium, e.g., a read-only memory device attached to or within an adapter or electronic device, such as a CD-ROM readable by a CD-ROM drive;
(2) alterable information stored on a rewriteable storage medium, e.g., a hard disk drive or diskette; or
(3) information conveyed to an adapter or electronic device by a communications medium, such as through a computer or a telephone network, e.g., the network 205, including wireless communications.
Such signal-bearing media, when carrying machine-readable instructions that direct the functions of the present invention, represent embodiments of the present invention.
FIG. 3 depicts a block diagram of the use of an example pointer-map data structure 230, according to an embodiment of the invention. The pointer-map 230 is stored in a reserved area of a protected area, which prohibits any code other than the code operating in privileged mode from constructing a valid pointer. The pointer map 230 features a double-dereferencing mechanism that offers protection from duping attacks because it is accessible by the pointer controller 232 and is not accessible to non-privileged code. When a pointer is created, a system call is made to set up a pointer-map entry for the pointer being created. The pointer-map entry serves as a protection agent that allows the system to isolate the actual pointer and its target object, thus preventing modified pointers from directly accessing unauthorized storage. This protection is achieved through the combination of several validation mechanisms that occur during pointer dereferencing, as further described below.
In an embodiment, a pointer is constructed as a group of bytes that contains an address. An example of a pointer is the pointer 330 located at address &A. The target of the pointer 330 is the target 350 at address &B, but the pointer 330 does not point directly at the target 350. That is, the storage location at address &A does not contain &B (the address of the target 350). Instead, the storage location for the pointer 330 at address &A points at an entry 305 in the pointer map 230 at address &X, which was established for the pointer 330 when the pointer 330 was created. The entry 305 contains the actual address of the target object at address &B in a target-address field 315. Thus, the contents of the entry 305 in the pointer map data structure 230 are used to actually access the target object 350.
As a mechanism to further ensure the validity of pointers, the entries in the pointer map 230 also include the address of the pointer to which they are associated, e.g., the entry 305 also includes a back-pointer field 316, which points back at its associated pointer 330. The back-pointer prevents code from altering a pointer to point elsewhere in the pointer map 230 and accessing an object that the code should be restricted from accessing.
To prevent destructive code from devising a double-dereferencing pointer map of its own, and thus duping the system into using an incorrect pointer map, in an embodiment the pointer map 230 is contained with a range of reserved addresses that only privileged system code, such as the pointer controller 232, can alter. Thus, the dereferencing mechanism of the pointer controller 232 not only checks to ensure that the back-pointer matches the address of the pointer being dereferenced, the pointer controller 232 also checks to ensure that the pointer points to a legitimate pointer map entry in the reserved address area range 228, as further described below with reference to FIG. 6.
The combination of the double-dereferencing mechanism and the reserved address area range 228 of the pointer map 230, plus the back-pointer mechanism all work together to defeat illegitimate pointer creation and use. Thus, a copied pointer is not identical to the original pointer (in contrast, the copied pointer 102 was identical to the original pointer 101 in FIG. 1).
The process of making a legitimate copy of a pointer is much the same as creating an original pointer. The pointer 335 at address &C represents a legitimate copy of the pointer 330. Since each pointer has its own entry in the pointer map 230 to prevent counterfeiting and ensure pointer validity, the pointer 335 contains &Y, which points to the entry 310, which is separate from the entry 305 for the pointer 330. The entry 310 has a back-pointer field 321 that points back at the pointer 335 and a target-address field 320, which points at the same target 350 as did the pointer 330. Thus, the back-pointer field 321 contains &C, which is the address of the pointer 335, and the target-address field 320 contains &B, which is the address of the target 350.
Pointer 340 at address &E, which contains address &X that points at entry 305, is an illegitimate pointer. In contrast to a legitimately copied pointer, attempts to construct and use an illegitimate pointer 340 are foiled by an embodiment of the invention because the pointer map entry 305 only points back to the original pointer 330 at address &A and not at the illegitimate pointer 340 at address &E, thus causing the dereferencing of the pointer 340 to fail the back-pointer check. The back-pointer check is further described below with reference to FIG. 6.
The pointer map 230 may also include control information 325 within each entry. The pointer controller 232 uses the control information 325 to further restrict the use of a pointer based on the permissions or attributes of the task that is executing the code 240. Thus, the pointer controller 232 uses the control information 325 to decide which attributes are required for pointer usage, such as context, process, local/global scope, and profile, although in other embodiments any appropriate attributes may be used. In another embodiment the pointer controller 232 uses the control information 325 for storage protection and security means, for example, to verify that access to storage is not exceeding the size of the storage accessible by the pointer. Although FIG. 3 shows control information 325, in another embodiment, the control information 325 is optional, not used, or not present.
In addition to the pointer map entries previously described above, the pointer map 230 also contains an administrate control area 360, which the pointer controller 232 uses to manage the creation, recycling, and reuse of pointer map entries such that the pointer map 230 is efficiently utilized. In an embodiment, the pointer controller 232 uses a garbage collection technique to recycle entries in the pointer map 230.
Although the various addresses (the pointer address, the back-pointer address, and the target address) were described above as if they were absolute addresses, a relative addressing scheme or any other appropriate addressing technique may be used in various other embodiments.
FIG. 4 depicts a flowchart of example processing for creating a pointer, according to an embodiment of the invention. Control begins at block 400. Control then continues to block 405 where the pointer controller 232 receives an address of a pointer to be created, an address of a target to be pointed to by the pointer from the code 240, and optional control information. Examples of pointers were previously described above with reference to FIG. 3 as pointers 330, 335, and 340 having respective addresses &A, &C, and &E. An example of a target was previously describe above with reference to FIG. 3 as target 350 having an address of &B.
Referring again to FIG. 4, control then continues to block 407 where the pointer controller 232 determines whether the pointer already has a valid associated entry in the pointer map 230, as further described below with reference to FIG. 6.
If the determination at block 407 is false, then control continues to block 410 where the pointer controller 232 creates an entry associated with the address of the pointer received at block 405 in the pointer map data structure 230 using information from the administrative control area 360. Examples of the entry were previously described above with reference to FIG. 3 as entries 305 and 310.
Control then continues to block 415 where the pointer controller 232 stores the address of the target in the target-address field in the created entry in the pointer map 230. Examples of the target-address fields were previously described above with reference to FIG. 3 as fields 315 and 320.
Control then continues to block 420 where the pointer controller 232 stores the address of the pointer in the back-pointer field of the entry of the pointer map 230. Examples of the back-pointer fields were previously described above with reference to FIG. 3 as fields 316 and 321.
Control then continues to block 422 where the pointer controller 232 optionally stores control information in the control information field 325. The control information 325 may include requirements that a subsequent access of the pointer will need to meet in order to use the pointer. For example, the control information 325 may include process, context, profile, and/or local/global scope information, which will be subsequently checked when the pointer is accessed. In other embodiments, any appropriate attribute information may be used.
Control then continues to block 425 where the pointer controller 232 stores the address of the entry in the location pointed to by the address of the pointer. Using the examples of FIG. 3, the pointer controller 232 stores &X at address &A or stores &Y at address &C. Thus, the pointer points at the entry in the pointer map 230 and does not point directly at the target, but instead uses the entry in the pointer map 230 to access the target indirectly.
Control then continues to block 430 where the function returns.
If the determination at block 407 is true, then the pointer already has a valid entry in the pointer map 230, so control continues to block 412 where the pointer controller 232 reuses the valid entry in the pointer map 230. Control then continues to block 415 as previously described above.
FIG. 5 depicts a flowchart of example processing for accessing a pointer, according to an embodiment of the invention. Control begins at block 500.
Control then continues to block 505 where the pointer controller 232 receives the address of the pointer from the code 240. Control then continues to block 510 where the pointer controller 232 determines whether the pointer is valid, as further described below with reference to FIG. 6. If the determination at block 510 is false, then control continues to block 598 where the pointer controller 232 returns an error to the invoking code 240.
If the determination at block 510 is true, then control continues to block 515 where the pointer controller 232 accesses the entry in the pointer map 230 associated with the pointer. Control then continues to block 520 where the pointer controller 232 determines whether the attributes in the control information 325 are satisfied or not used. For example, if the attributes indicate that only a specified process may access the pointer, the pointer controller 232 determines whether the invoking code 240 is part of that specified process. In other embodiments, the pointer controller 232 determines whether any of the attributes previously described above with reference to FIG. 3 are met.
If the determination at block 520 is false (the attributes in the control information 325 when present are not satisfied), then control continues to block 598 where the pointer controller 232 returns an error to the invoking code 240.
If the determination at block 520 is true (the attributes in the control information 325 are satisfied or the control information 325 is not present or otherwise not used), then control continues to block 525 where the pointer controller 232 retrieves the address of the target from the target-address field in the entry in the pointer map 230. Examples of the target-address field are shown as reference numerals 315 and 320 in FIG. 3.
Control then continues to block 599 where the pointer controller 232 returns the address of the target to the invoking code 240.
FIG. 6 depicts a flowchart of example processing for determining the validity of a pointer, according to an embodiment of the invention. Control begins at block 600.
Control then continues to block 605 where the pointer controller 232 receives the address of the pointer to be validated. Control then continues to block 610 where the pointer controller 232 accesses the contents at the storage location indicated in the address received at block 605 and determines whether the accessed content is an address within an entry of the pointer map 230 within the address range of the reserved area 228, that is whether the address contained at the pointer location is within an entry of the pointer map 230 within the address range of the reserved area 228. Using an example from FIG. 3, if the pointer controller 232 receives &A as the address of the pointer to be validated, the pointer controller 232 determines whether &X is an address of the entry 305 within the reserved address range. If the determination at block 610 is false, then control continues to block 698 where the pointer controller 232 returns an indication that the pointer is invalid.
If the determination at block 610 is true, then control continues to block 615 where the pointer controller 232 accesses an entry in the pointer map 230 using the address contained at the pointer location.
Control then continues to block 620 where the pointer controller 232 determines whether the back-pointer in the entry points at the pointer (i.e., whether the contents of the back-pointer field equal the address of the pointer that was previously received at block 605). If the determination at block 620 is false, then control continues to block 698 where the pointer controller 232 returns an indication to the invoker that the pointer is invalid.
If the determination at block 620 is true, then control continues to block 699 where the pointer controller 232 returns an indication to the invoker that the pointer is valid.
In the previous detailed description of exemplary embodiments of the invention, reference was made to the accompanying drawings (where like numbers represent like elements), which form a part hereof, and in which is shown by way of illustration specific exemplary embodiments in which the invention may be practiced. These embodiments were described in sufficient detail to enable those skilled in the art to practice the invention, but other embodiments may be utilized and logical, mechanical, electrical, and other changes may be made without departing from the scope of the present invention. Different instances of the word “embodiment” as used within this specification do not necessarily refer to the same embodiment, but they may. The previous detailed description is, therefore, not to be taken in a limiting sense, and the scope of the present invention is defined only by the appended claims.
In the previous description, numerous specific details were set forth to provide a thorough understanding of the invention. But, the invention may be practiced without these specific details. In other instances, well-known circuits, structures, and techniques have not been shown in detail in order not to obscure the invention.

Claims (20)

1. A method comprising:
receiving an address of a storage location of a pointer from code that accesses the pointer;
finding an entry in a pointer map based on the pointer, wherein the entry comprises an address of a storage location of a target of the pointer;
determining whether the entry further comprises the address of the storage location of the pointer; and
if the entry comprises the address of the storage location of the pointer, returning the address of the storage location of the target of the pointer to the code that accesses the pointer.
2. The method of claim 1, further comprising:
verifying that the entry is located within a reserved address range.
3. The method of claim 1, further comprising:
receiving the address of the storage location of the target; and
storing the address of the storage location of the target in the entry.
4. The method of claim 1, further comprising:
receiving an address of the pointer; and
storing the address of the pointer in a back-pointer field in the entry.
5. The method of claim 1, further comprising:
storing an address of the entry at a location indicated by the address of the storage location of the pointer.
6. An apparatus comprising:
means for storing a target-address in an entry of a pointer-map, wherein the target-address comprises a first address of a storage location of a target of a pointer;
means for storing a painter-address in the entry of the pointer-map, wherein the pointer-address comprises a second address of a storage location of the pointer;
means for storing a third address of a location of the entry into the storage location of the pointer;
means for receiving the pointer-address from code that accesses the pointer;
means for finding the entry in the pointer map based on the pointer-address; and
means for returning the target-address of the target of the pointer to the code that accesses the pointer if the entry comprises the pointer-address.
7. The apparatus of claim 6, further comprising:
means for storing control information in the entry of the pointer-map.
8. The apparatus of claim 7, wherein the control information is selected from a group consisting of: a context, a process, a local/global scope, and a profile.
9. The apparatus of claim 7, farther comprising:
means for verifying that a process associated with the pointer-address has attributes that satisfy the control information.
10. The apparatus of claim 6, further comprising:
means for determining whether the pointer is valid based on the pointer-address.
11. A signal-bearing medium encoded with instructions, wherein the instructions when executed by a processor comprise:
receiving a pointer-address, wherein the pointer-address comprises an address of a storage location of a pointer, and a target-address;
determining whether a pointer has a valid entry in a pointer map based on the pointer-address; wherein the determining further comprises determining whether the pointer-address exists in the pointer map;
when the valid entry does not exist, creating a new entry in the pointer map for the pointer; and storing the target-address in the new entry;
receiving the pointer-address from code that accesses the pointer;
finding the new entry in the pointer map based on the pointer address; and
returning the target-address of a target of the pointer to the code that accesses the pointer if the new entry comprises the pointer-address.
12. The signal-bearing medium of claim 11, wherein the instructions further comprise:
staring the pointer-address in the new entry.
13. The signal-bearing medium of claim 11, wherein the instructions further comprise:
storing control information in the new entry.
14. The signal-bearing medium of claim 13, wherein the control information is selected from a group consisting of: context, process, local/global scope, and profile.
15. The signal-bearing medium of claim 11, wherein the determining further comprises:
verifying whether content at the pointer-address comprises an address within a reserved range.
16. A signal-bearing medium encoded with a data structure accessed by a controller that is to be executed by a processor, wherein the data structure comprises at least one entry, wherein the entry comprises:
a back-pointer, wherein the controller is to set an address of a storage location of a pointer in the back-pointer; and
a target-address, wherein the controller is to set an address of a target of the pointer in the target-address, is to store an address of the entry in the storage location of the pointer, is to receive the address of the storage location of the pointer, and is to determine whether the pointer is valid based on whether content of the back-pointer equals the address of the storage location of the pointer, and is to find the target-address of the target based on the entry, and return the target-address of the target of the pointer to code that accesses the pointer if the pointer is valid.
17. The signal-bearing medium of claim 16, where the at least one entry further comprises:
control information, wherein the pointer controller is further to set the control information.
18. An electronic device comprising:
a processor; and
a storage device encoded with instructions, wherein the instructions when executed on the processor comprise:
receiving a pointer-address, wherein the pointer-address comprises an address of a storage location of a pointer and a target-address,
determining whether the pointer has an entry that is valid in a pointer map based on the pointer-address, wherein the determining further comprises determining whether a back-pointer in the entry comprises the pointer-address,
when the pointer has the entry that is valid, storing the target-address in the valid entry,
receiving the pointer-address from code that accesses the pointer,
finding the entry in the pointer map based on the painter-address, and
returning the target-address of a target of the pointer to the code that accesses the pointer if the entry comprises the pointer-address.
19. The electronic device of claim 18, wherein the instructions further comprise:
storing the pointer-address in the valid entry.
20. The electronic device of claim 18, wherein the determining further comprises:
verifying whether content at the pointer-address comprises an address of the entry within a reserved range.
US10/401,252 2003-03-27 2003-03-27 Secure pointers Expired - Fee Related US7181580B2 (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
US10/401,252 US7181580B2 (en) 2003-03-27 2003-03-27 Secure pointers

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
US10/401,252 US7181580B2 (en) 2003-03-27 2003-03-27 Secure pointers

Publications (2)

Publication Number Publication Date
US20040193814A1 US20040193814A1 (en) 2004-09-30
US7181580B2 true US7181580B2 (en) 2007-02-20

Family

ID=32989396

Family Applications (1)

Application Number Title Priority Date Filing Date
US10/401,252 Expired - Fee Related US7181580B2 (en) 2003-03-27 2003-03-27 Secure pointers

Country Status (1)

Country Link
US (1) US7181580B2 (en)

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20050193428A1 (en) * 2004-02-26 2005-09-01 Ring Sandra E. Method, system, and computer-readable medium for recovering from an operating system exploit
US8972952B2 (en) 2012-02-03 2015-03-03 Apple Inc. Tracer based runtime optimization for dynamic programming languages
US9003542B1 (en) 2010-12-13 2015-04-07 Symantec Corporation Systems and methods for replacing sensitive information stored within non-secure environments with secure references to the same
US20170031815A1 (en) * 2015-07-29 2017-02-02 Pradeep Varma Wand: Concurrent Boxing System For All Pointers With Or Without Garbage Collection

Families Citing this family (195)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US9026859B1 (en) * 2012-03-14 2015-05-05 Google Inc. Safer mechanism for using pointers to code
US11630585B1 (en) 2016-08-25 2023-04-18 Pure Storage, Inc. Processing evacuation events in a storage array that includes a plurality of storage devices
US9716755B2 (en) 2015-05-26 2017-07-25 Pure Storage, Inc. Providing cloud storage array services by a local storage array in a data center
US11102298B1 (en) 2015-05-26 2021-08-24 Pure Storage, Inc. Locally providing cloud storage services for fleet management
US9594678B1 (en) 2015-05-27 2017-03-14 Pure Storage, Inc. Preventing duplicate entries of identical data in a storage device
US11503031B1 (en) 2015-05-29 2022-11-15 Pure Storage, Inc. Storage array access control from cloud-based user authorization and authentication
US9300660B1 (en) 2015-05-29 2016-03-29 Pure Storage, Inc. Providing authorization and authentication in a cloud for a user of a storage array
US9444822B1 (en) 2015-05-29 2016-09-13 Pure Storage, Inc. Storage array access control from cloud-based user authorization and authentication
US10021170B2 (en) 2015-05-29 2018-07-10 Pure Storage, Inc. Managing a storage array using client-side services
US9588691B2 (en) * 2015-06-10 2017-03-07 Pure Storage, Inc. Dynamically managing control information in a storage device
US9594512B1 (en) 2015-06-19 2017-03-14 Pure Storage, Inc. Attributing consumed storage capacity among entities storing data in a storage array
US10310740B2 (en) 2015-06-23 2019-06-04 Pure Storage, Inc. Aligning memory access operations to a geometry of a storage device
US10296236B2 (en) 2015-07-01 2019-05-21 Pure Storage, Inc. Offloading device management responsibilities from a storage device in an array of storage devices
US9892071B2 (en) 2015-08-03 2018-02-13 Pure Storage, Inc. Emulating a remote direct memory access (‘RDMA’) link between controllers in a storage array
US9851762B1 (en) 2015-08-06 2017-12-26 Pure Storage, Inc. Compliant printed circuit board (‘PCB’) within an enclosure
US11294588B1 (en) 2015-08-24 2022-04-05 Pure Storage, Inc. Placing data within a storage device
US10198194B2 (en) 2015-08-24 2019-02-05 Pure Storage, Inc. Placing data within a storage device of a flash array
US11625181B1 (en) 2015-08-24 2023-04-11 Pure Storage, Inc. Data tiering using snapshots
US10514978B1 (en) 2015-10-23 2019-12-24 Pure Storage, Inc. Automatic deployment of corrective measures for storage arrays
US9384082B1 (en) 2015-10-23 2016-07-05 Pure Storage, Inc. Proactively providing corrective measures for storage arrays
US11360844B1 (en) 2015-10-23 2022-06-14 Pure Storage, Inc. Recovery of a container storage provider
US10284232B2 (en) 2015-10-28 2019-05-07 Pure Storage, Inc. Dynamic error processing in a storage device
US9740414B2 (en) 2015-10-29 2017-08-22 Pure Storage, Inc. Optimizing copy operations
US10374868B2 (en) 2015-10-29 2019-08-06 Pure Storage, Inc. Distributed command processing in a flash storage system
US10353777B2 (en) 2015-10-30 2019-07-16 Pure Storage, Inc. Ensuring crash-safe forward progress of a system configuration update
GB2544315B (en) * 2015-11-12 2018-02-14 Advanced Risc Mach Ltd An apparatus and method for controlling use of bounded pointers
US9760479B2 (en) 2015-12-02 2017-09-12 Pure Storage, Inc. Writing data in a storage system that includes a first type of storage device and a second type of storage device
US11762764B1 (en) 2015-12-02 2023-09-19 Pure Storage, Inc. Writing data in a storage system that includes a first type of storage device and a second type of storage device
US10326836B2 (en) 2015-12-08 2019-06-18 Pure Storage, Inc. Partially replicating a snapshot between storage systems
US11616834B2 (en) 2015-12-08 2023-03-28 Pure Storage, Inc. Efficient replication of a dataset to the cloud
US11347697B1 (en) 2015-12-15 2022-05-31 Pure Storage, Inc. Proactively optimizing a storage system
US10162835B2 (en) 2015-12-15 2018-12-25 Pure Storage, Inc. Proactive management of a plurality of storage arrays in a multi-array system
US10346043B2 (en) 2015-12-28 2019-07-09 Pure Storage, Inc. Adaptive computing for data compression
US9886314B2 (en) 2016-01-28 2018-02-06 Pure Storage, Inc. Placing workloads in a multi-array system
US10572460B2 (en) 2016-02-11 2020-02-25 Pure Storage, Inc. Compressing data in dependence upon characteristics of a storage system
US9760297B2 (en) 2016-02-12 2017-09-12 Pure Storage, Inc. Managing input/output (‘I/O’) queues in a data storage system
US9959043B2 (en) 2016-03-16 2018-05-01 Pure Storage, Inc. Performing a non-disruptive upgrade of data in a storage system
US11112990B1 (en) 2016-04-27 2021-09-07 Pure Storage, Inc. Managing storage device evacuation
US11809727B1 (en) 2016-04-27 2023-11-07 Pure Storage, Inc. Predicting failures in a storage system that includes a plurality of storage devices
US9841921B2 (en) 2016-04-27 2017-12-12 Pure Storage, Inc. Migrating data in a storage array that includes a plurality of storage devices
US9811264B1 (en) 2016-04-28 2017-11-07 Pure Storage, Inc. Deploying client-specific applications in a storage system utilizing redundant system resources
US10303390B1 (en) 2016-05-02 2019-05-28 Pure Storage, Inc. Resolving fingerprint collisions in flash storage system
US11231858B2 (en) 2016-05-19 2022-01-25 Pure Storage, Inc. Dynamically configuring a storage system to facilitate independent scaling of resources
US9507532B1 (en) 2016-05-20 2016-11-29 Pure Storage, Inc. Migrating data in a storage array that includes a plurality of storage devices and a plurality of write buffer devices
US10691567B2 (en) 2016-06-03 2020-06-23 Pure Storage, Inc. Dynamically forming a failure domain in a storage system that includes a plurality of blades
US10452310B1 (en) 2016-07-13 2019-10-22 Pure Storage, Inc. Validating cabling for storage component admission to a storage array
US11706895B2 (en) 2016-07-19 2023-07-18 Pure Storage, Inc. Independent scaling of compute resources and storage resources in a storage system
US10459652B2 (en) 2016-07-27 2019-10-29 Pure Storage, Inc. Evacuating blades in a storage array that includes a plurality of blades
US10474363B1 (en) 2016-07-29 2019-11-12 Pure Storage, Inc. Space reporting in a storage system
US11531577B1 (en) 2016-09-07 2022-12-20 Pure Storage, Inc. Temporarily limiting access to a storage device
US11481261B1 (en) 2016-09-07 2022-10-25 Pure Storage, Inc. Preventing extended latency in a storage system
US10235229B1 (en) 2016-09-07 2019-03-19 Pure Storage, Inc. Rehabilitating storage devices in a storage array that includes a plurality of storage devices
US10671439B1 (en) 2016-09-07 2020-06-02 Pure Storage, Inc. Workload planning with quality-of-service (‘QOS’) integration
US10331588B2 (en) 2016-09-07 2019-06-25 Pure Storage, Inc. Ensuring the appropriate utilization of system resources using weighted workload based, time-independent scheduling
US11960348B2 (en) 2016-09-07 2024-04-16 Pure Storage, Inc. Cloud-based monitoring of hardware components in a fleet of storage systems
US11886922B2 (en) 2016-09-07 2024-01-30 Pure Storage, Inc. Scheduling input/output operations for a storage system
US10146585B2 (en) 2016-09-07 2018-12-04 Pure Storage, Inc. Ensuring the fair utilization of system resources using workload based, time-independent scheduling
US10908966B1 (en) 2016-09-07 2021-02-02 Pure Storage, Inc. Adapting target service times in a storage system
US10007459B2 (en) 2016-10-20 2018-06-26 Pure Storage, Inc. Performance tuning in a storage system that includes one or more storage devices
US11379132B1 (en) 2016-10-20 2022-07-05 Pure Storage, Inc. Correlating medical sensor data
US10162566B2 (en) 2016-11-22 2018-12-25 Pure Storage, Inc. Accumulating application-level statistics in a storage system
US11620075B2 (en) 2016-11-22 2023-04-04 Pure Storage, Inc. Providing application aware storage
US10198205B1 (en) 2016-12-19 2019-02-05 Pure Storage, Inc. Dynamically adjusting a number of storage devices utilized to simultaneously service write operations
US11461273B1 (en) 2016-12-20 2022-10-04 Pure Storage, Inc. Modifying storage distribution in a storage system that includes one or more storage devices
US10489307B2 (en) 2017-01-05 2019-11-26 Pure Storage, Inc. Periodically re-encrypting user data stored on a storage device
US11307998B2 (en) 2017-01-09 2022-04-19 Pure Storage, Inc. Storage efficiency of encrypted host system data
US10503700B1 (en) 2017-01-19 2019-12-10 Pure Storage, Inc. On-demand content filtering of snapshots within a storage system
US11340800B1 (en) 2017-01-19 2022-05-24 Pure Storage, Inc. Content masking in a storage system
US11163624B2 (en) 2017-01-27 2021-11-02 Pure Storage, Inc. Dynamically adjusting an amount of log data generated for a storage system
US10521344B1 (en) 2017-03-10 2019-12-31 Pure Storage, Inc. Servicing input/output (‘I/O’) operations directed to a dataset that is synchronized across a plurality of storage systems
US11169727B1 (en) 2017-03-10 2021-11-09 Pure Storage, Inc. Synchronous replication between storage systems with virtualized storage
US11442825B2 (en) 2017-03-10 2022-09-13 Pure Storage, Inc. Establishing a synchronous replication relationship between two or more storage systems
US11675520B2 (en) 2017-03-10 2023-06-13 Pure Storage, Inc. Application replication among storage systems synchronously replicating a dataset
US10454810B1 (en) 2017-03-10 2019-10-22 Pure Storage, Inc. Managing host definitions across a plurality of storage systems
US11803453B1 (en) 2017-03-10 2023-10-31 Pure Storage, Inc. Using host connectivity states to avoid queuing I/O requests
US11941279B2 (en) 2017-03-10 2024-03-26 Pure Storage, Inc. Data path virtualization
US10503427B2 (en) 2017-03-10 2019-12-10 Pure Storage, Inc. Synchronously replicating datasets and other managed objects to cloud-based storage systems
US11089105B1 (en) 2017-12-14 2021-08-10 Pure Storage, Inc. Synchronously replicating datasets in cloud-based storage systems
US9910618B1 (en) 2017-04-10 2018-03-06 Pure Storage, Inc. Migrating applications executing on a storage system
US10459664B1 (en) 2017-04-10 2019-10-29 Pure Storage, Inc. Virtualized copy-by-reference
US11868629B1 (en) 2017-05-05 2024-01-09 Pure Storage, Inc. Storage system sizing service
US10552090B2 (en) 2017-09-07 2020-02-04 Pure Storage, Inc. Solid state drives with multiple types of addressable memory
US11422731B1 (en) 2017-06-12 2022-08-23 Pure Storage, Inc. Metadata-based replication of a dataset
CN116431072A (en) 2017-06-12 2023-07-14 净睿存储股份有限公司 Accessible fast durable storage integrated into mass storage device
US11340939B1 (en) 2017-06-12 2022-05-24 Pure Storage, Inc. Application-aware analytics for storage systems
US10853148B1 (en) 2017-06-12 2020-12-01 Pure Storage, Inc. Migrating workloads between a plurality of execution environments
US10976962B2 (en) 2018-03-15 2021-04-13 Pure Storage, Inc. Servicing I/O operations in a cloud-based storage system
US10613791B2 (en) 2017-06-12 2020-04-07 Pure Storage, Inc. Portable snapshot replication between storage systems
US11592991B2 (en) 2017-09-07 2023-02-28 Pure Storage, Inc. Converting raid data between persistent storage types
US10417092B2 (en) 2017-09-07 2019-09-17 Pure Storage, Inc. Incremental RAID stripe update parity calculation
US10884636B1 (en) 2017-06-12 2021-01-05 Pure Storage, Inc. Presenting workload performance in a storage system
US11210133B1 (en) 2017-06-12 2021-12-28 Pure Storage, Inc. Workload mobility between disparate execution environments
US11593036B2 (en) 2017-06-12 2023-02-28 Pure Storage, Inc. Staging data within a unified storage element
US11442669B1 (en) 2018-03-15 2022-09-13 Pure Storage, Inc. Orchestrating a virtual storage system
US11016824B1 (en) 2017-06-12 2021-05-25 Pure Storage, Inc. Event identification with out-of-order reporting in a cloud-based environment
US11609718B1 (en) 2017-06-12 2023-03-21 Pure Storage, Inc. Identifying valid data after a storage system recovery
US11561714B1 (en) 2017-07-05 2023-01-24 Pure Storage, Inc. Storage efficiency driven migration
US11477280B1 (en) 2017-07-26 2022-10-18 Pure Storage, Inc. Integrating cloud storage services
US10831935B2 (en) 2017-08-31 2020-11-10 Pure Storage, Inc. Encryption management with host-side data reduction
US10671435B1 (en) 2017-10-19 2020-06-02 Pure Storage, Inc. Data transformation caching in an artificial intelligence infrastructure
US10360214B2 (en) 2017-10-19 2019-07-23 Pure Storage, Inc. Ensuring reproducibility in an artificial intelligence infrastructure
US11455168B1 (en) 2017-10-19 2022-09-27 Pure Storage, Inc. Batch building for deep learning training workloads
US10452444B1 (en) 2017-10-19 2019-10-22 Pure Storage, Inc. Storage system with compute resources and shared storage resources
US11861423B1 (en) 2017-10-19 2024-01-02 Pure Storage, Inc. Accelerating artificial intelligence (‘AI’) workflows
US11494692B1 (en) 2018-03-26 2022-11-08 Pure Storage, Inc. Hyperscale artificial intelligence and machine learning infrastructure
US10509581B1 (en) 2017-11-01 2019-12-17 Pure Storage, Inc. Maintaining write consistency in a multi-threaded storage system
US10484174B1 (en) 2017-11-01 2019-11-19 Pure Storage, Inc. Protecting an encryption key for data stored in a storage system that includes a plurality of storage devices
US10671494B1 (en) 2017-11-01 2020-06-02 Pure Storage, Inc. Consistent selection of replicated datasets during storage system recovery
US10817392B1 (en) 2017-11-01 2020-10-27 Pure Storage, Inc. Ensuring resiliency to storage device failures in a storage system that includes a plurality of storage devices
US10467107B1 (en) 2017-11-01 2019-11-05 Pure Storage, Inc. Maintaining metadata resiliency among storage device failures
US10929226B1 (en) 2017-11-21 2021-02-23 Pure Storage, Inc. Providing for increased flexibility for large scale parity
US10990282B1 (en) 2017-11-28 2021-04-27 Pure Storage, Inc. Hybrid data tiering with cloud storage
US10936238B2 (en) 2017-11-28 2021-03-02 Pure Storage, Inc. Hybrid data tiering
US10795598B1 (en) 2017-12-07 2020-10-06 Pure Storage, Inc. Volume migration for storage systems synchronously replicating a dataset
US11036677B1 (en) 2017-12-14 2021-06-15 Pure Storage, Inc. Replicated data integrity
US10929031B2 (en) 2017-12-21 2021-02-23 Pure Storage, Inc. Maximizing data reduction in a partially encrypted volume
US10992533B1 (en) 2018-01-30 2021-04-27 Pure Storage, Inc. Policy based path management
US10521151B1 (en) 2018-03-05 2019-12-31 Pure Storage, Inc. Determining effective space utilization in a storage system
US11150834B1 (en) 2018-03-05 2021-10-19 Pure Storage, Inc. Determining storage consumption in a storage system
US10942650B1 (en) 2018-03-05 2021-03-09 Pure Storage, Inc. Reporting capacity utilization in a storage system
US11861170B2 (en) 2018-03-05 2024-01-02 Pure Storage, Inc. Sizing resources for a replication target
US10296258B1 (en) 2018-03-09 2019-05-21 Pure Storage, Inc. Offloading data storage to a decentralized storage network
US10917471B1 (en) 2018-03-15 2021-02-09 Pure Storage, Inc. Active membership in a cloud-based storage system
US11288138B1 (en) 2018-03-15 2022-03-29 Pure Storage, Inc. Recovery from a system fault in a cloud-based storage system
US11048590B1 (en) 2018-03-15 2021-06-29 Pure Storage, Inc. Data consistency during recovery in a cloud-based storage system
US11210009B1 (en) 2018-03-15 2021-12-28 Pure Storage, Inc. Staging data in a cloud-based storage system
US10924548B1 (en) 2018-03-15 2021-02-16 Pure Storage, Inc. Symmetric storage using a cloud-based storage system
US11171950B1 (en) 2018-03-21 2021-11-09 Pure Storage, Inc. Secure cloud-based storage system management
US11095706B1 (en) 2018-03-21 2021-08-17 Pure Storage, Inc. Secure cloud-based storage system management
US10838833B1 (en) 2018-03-26 2020-11-17 Pure Storage, Inc. Providing for high availability in a data analytics pipeline without replicas
US11860996B1 (en) * 2018-04-06 2024-01-02 Apple Inc. Security concepts for web frameworks
US11392553B1 (en) 2018-04-24 2022-07-19 Pure Storage, Inc. Remote data management
US11436344B1 (en) 2018-04-24 2022-09-06 Pure Storage, Inc. Secure encryption in deduplication cluster
US11675503B1 (en) 2018-05-21 2023-06-13 Pure Storage, Inc. Role-based data access
US11455409B2 (en) 2018-05-21 2022-09-27 Pure Storage, Inc. Storage layer data obfuscation
US11954220B2 (en) 2018-05-21 2024-04-09 Pure Storage, Inc. Data protection for container storage
US20190354628A1 (en) 2018-05-21 2019-11-21 Pure Storage, Inc. Asynchronous replication of synchronously replicated data
US10871922B2 (en) 2018-05-22 2020-12-22 Pure Storage, Inc. Integrated storage management between storage systems and container orchestrators
US11416298B1 (en) 2018-07-20 2022-08-16 Pure Storage, Inc. Providing application-specific storage by a storage system
US11403000B1 (en) 2018-07-20 2022-08-02 Pure Storage, Inc. Resiliency in a cloud-based storage system
US11146564B1 (en) 2018-07-24 2021-10-12 Pure Storage, Inc. Login authentication in a cloud storage platform
US11954238B1 (en) 2018-07-24 2024-04-09 Pure Storage, Inc. Role-based access control for a storage system
US11632360B1 (en) 2018-07-24 2023-04-18 Pure Storage, Inc. Remote access to a storage device
US11860820B1 (en) 2018-09-11 2024-01-02 Pure Storage, Inc. Processing data through a storage system in a data pipeline
US10671302B1 (en) 2018-10-26 2020-06-02 Pure Storage, Inc. Applying a rate limit across a plurality of storage systems
US11340837B1 (en) 2018-11-18 2022-05-24 Pure Storage, Inc. Storage system management via a remote console
US10963189B1 (en) 2018-11-18 2021-03-30 Pure Storage, Inc. Coalescing write operations in a cloud-based storage system
US11526405B1 (en) 2018-11-18 2022-12-13 Pure Storage, Inc. Cloud-based disaster recovery
US11379254B1 (en) 2018-11-18 2022-07-05 Pure Storage, Inc. Dynamic configuration of a cloud-based storage system
US11650749B1 (en) 2018-12-17 2023-05-16 Pure Storage, Inc. Controlling access to sensitive data in a shared dataset
US11003369B1 (en) 2019-01-14 2021-05-11 Pure Storage, Inc. Performing a tune-up procedure on a storage device during a boot process
US11042452B1 (en) 2019-03-20 2021-06-22 Pure Storage, Inc. Storage system data recovery using data recovery as a service
US11221778B1 (en) 2019-04-02 2022-01-11 Pure Storage, Inc. Preparing data for deduplication
US11068162B1 (en) 2019-04-09 2021-07-20 Pure Storage, Inc. Storage management in a cloud data store
US11853266B2 (en) 2019-05-15 2023-12-26 Pure Storage, Inc. Providing a file system in a cloud environment
US11392555B2 (en) 2019-05-15 2022-07-19 Pure Storage, Inc. Cloud-based file services
US11327676B1 (en) 2019-07-18 2022-05-10 Pure Storage, Inc. Predictive data streaming in a virtual storage system
US11126364B2 (en) 2019-07-18 2021-09-21 Pure Storage, Inc. Virtual storage system architecture
US11550514B2 (en) 2019-07-18 2023-01-10 Pure Storage, Inc. Efficient transfers between tiers of a virtual storage system
US11093139B1 (en) 2019-07-18 2021-08-17 Pure Storage, Inc. Durably storing data within a virtual storage system
US11861221B1 (en) 2019-07-18 2024-01-02 Pure Storage, Inc. Providing scalable and reliable container-based storage services
US11526408B2 (en) 2019-07-18 2022-12-13 Pure Storage, Inc. Data recovery in a virtual storage system
US11487715B1 (en) 2019-07-18 2022-11-01 Pure Storage, Inc. Resiliency in a cloud-based storage system
US11086553B1 (en) 2019-08-28 2021-08-10 Pure Storage, Inc. Tiering duplicated objects in a cloud-based object store
US11693713B1 (en) 2019-09-04 2023-07-04 Pure Storage, Inc. Self-tuning clusters for resilient microservices
US11797569B2 (en) 2019-09-13 2023-10-24 Pure Storage, Inc. Configurable data replication
US11360689B1 (en) 2019-09-13 2022-06-14 Pure Storage, Inc. Cloning a tracking copy of replica data
US11573864B1 (en) 2019-09-16 2023-02-07 Pure Storage, Inc. Automating database management in a storage system
US11669386B1 (en) 2019-10-08 2023-06-06 Pure Storage, Inc. Managing an application's resource stack
US11868318B1 (en) 2019-12-06 2024-01-09 Pure Storage, Inc. End-to-end encryption in a storage system with multi-tenancy
US11733901B1 (en) 2020-01-13 2023-08-22 Pure Storage, Inc. Providing persistent storage to transient cloud computing services
US11720497B1 (en) 2020-01-13 2023-08-08 Pure Storage, Inc. Inferred nonsequential prefetch based on data access patterns
US11709636B1 (en) 2020-01-13 2023-07-25 Pure Storage, Inc. Non-sequential readahead for deep learning training
US11637896B1 (en) 2020-02-25 2023-04-25 Pure Storage, Inc. Migrating applications to a cloud-computing environment
US11868622B2 (en) 2020-02-25 2024-01-09 Pure Storage, Inc. Application recovery across storage systems
US11321006B1 (en) 2020-03-25 2022-05-03 Pure Storage, Inc. Data loss prevention during transitions from a replication source
US11630598B1 (en) 2020-04-06 2023-04-18 Pure Storage, Inc. Scheduling data replication operations
US11301152B1 (en) 2020-04-06 2022-04-12 Pure Storage, Inc. Intelligently moving data between storage systems
US11494267B2 (en) 2020-04-14 2022-11-08 Pure Storage, Inc. Continuous value data redundancy
US11921670B1 (en) 2020-04-20 2024-03-05 Pure Storage, Inc. Multivariate data backup retention policies
US11431488B1 (en) 2020-06-08 2022-08-30 Pure Storage, Inc. Protecting local key generation using a remote key management service
US11349917B2 (en) 2020-07-23 2022-05-31 Pure Storage, Inc. Replication handling among distinct networks
US11442652B1 (en) 2020-07-23 2022-09-13 Pure Storage, Inc. Replication handling during storage system transportation
US11397545B1 (en) 2021-01-20 2022-07-26 Pure Storage, Inc. Emulating persistent reservations in a cloud-based storage system
US11853285B1 (en) 2021-01-22 2023-12-26 Pure Storage, Inc. Blockchain logging of volume-level events in a storage system
US11563744B2 (en) 2021-02-22 2023-01-24 Bank Of America Corporation System for detection and classification of intrusion using machine learning techniques
US20220365827A1 (en) 2021-05-12 2022-11-17 Pure Storage, Inc. Rebalancing In A Fleet Of Storage Systems Using Data Science
US11816129B2 (en) 2021-06-22 2023-11-14 Pure Storage, Inc. Generating datasets using approximate baselines
US11714723B2 (en) 2021-10-29 2023-08-01 Pure Storage, Inc. Coordinated snapshots for data stored across distinct storage environments
US11914867B2 (en) 2021-10-29 2024-02-27 Pure Storage, Inc. Coordinated snapshots among storage systems implementing a promotion/demotion model
US11893263B2 (en) 2021-10-29 2024-02-06 Pure Storage, Inc. Coordinated checkpoints among storage systems implementing checkpoint-based replication
US11922052B2 (en) 2021-12-15 2024-03-05 Pure Storage, Inc. Managing links between storage objects
US11847071B2 (en) 2021-12-30 2023-12-19 Pure Storage, Inc. Enabling communication between a single-port device and multiple storage system controllers
US11860780B2 (en) 2022-01-28 2024-01-02 Pure Storage, Inc. Storage cache management
US11886295B2 (en) 2022-01-31 2024-01-30 Pure Storage, Inc. Intra-block error correction

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US4868745A (en) * 1986-05-30 1989-09-19 Hewlett-Packard Company Data processing system and method for the direct and indirect execution of uniformly structured object types
US5459798A (en) * 1993-03-19 1995-10-17 Intel Corporation System and method of pattern recognition employing a multiprocessing pipelined apparatus with private pattern memory
US5835963A (en) * 1994-09-09 1998-11-10 Hitachi, Ltd. Processor with an addressable address translation buffer operative in associative and non-associative modes
US5881379A (en) * 1996-05-20 1999-03-09 International Business Machines Corporation System, method, and program for using duplicated direct pointer sets in keyed database records to enhance data recoverability without logging
US6085296A (en) * 1997-11-12 2000-07-04 Digital Equipment Corporation Sharing memory pages and page tables among computer processes

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US4868745A (en) * 1986-05-30 1989-09-19 Hewlett-Packard Company Data processing system and method for the direct and indirect execution of uniformly structured object types
US5459798A (en) * 1993-03-19 1995-10-17 Intel Corporation System and method of pattern recognition employing a multiprocessing pipelined apparatus with private pattern memory
US5835963A (en) * 1994-09-09 1998-11-10 Hitachi, Ltd. Processor with an addressable address translation buffer operative in associative and non-associative modes
US5881379A (en) * 1996-05-20 1999-03-09 International Business Machines Corporation System, method, and program for using duplicated direct pointer sets in keyed database records to enhance data recoverability without logging
US6085296A (en) * 1997-11-12 2000-07-04 Digital Equipment Corporation Sharing memory pages and page tables among computer processes

Cited By (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20050193428A1 (en) * 2004-02-26 2005-09-01 Ring Sandra E. Method, system, and computer-readable medium for recovering from an operating system exploit
US9003542B1 (en) 2010-12-13 2015-04-07 Symantec Corporation Systems and methods for replacing sensitive information stored within non-secure environments with secure references to the same
US8972952B2 (en) 2012-02-03 2015-03-03 Apple Inc. Tracer based runtime optimization for dynamic programming languages
US9003384B2 (en) 2012-02-03 2015-04-07 Apple Inc. Methods and apparatuses for automatic type checking via poisoned pointers
US9027010B2 (en) 2012-02-03 2015-05-05 Apple Inc. Runtime optimization using meta data for dynamic programming languages
US9128732B2 (en) 2012-02-03 2015-09-08 Apple Inc. Selective randomization for non-deterministically compiled code
US20170031815A1 (en) * 2015-07-29 2017-02-02 Pradeep Varma Wand: Concurrent Boxing System For All Pointers With Or Without Garbage Collection

Also Published As

Publication number Publication date
US20040193814A1 (en) 2004-09-30

Similar Documents

Publication Publication Date Title
US7181580B2 (en) Secure pointers
US8850572B2 (en) Methods for handling a file associated with a program in a restricted program environment
US6802006B1 (en) System and method of verifying the authenticity of dynamically connectable executable images
US9600663B2 (en) System and method for protection from buffer overflow vulnerability due to placement new constructs in C++
JP4759059B2 (en) Page coloring that maps memory pages to programs
US8631482B2 (en) Method for managing computer resources accessed by a program operating in a restricted environment
US8955062B2 (en) Method and system for permitting access to resources based on instructions of a code tagged with an identifier assigned to a domain
US20070050848A1 (en) Preventing malware from accessing operating system services
US8850573B1 (en) Computing device with untrusted user execution mode
US7607173B1 (en) Method and apparatus for preventing rootkit installation
MX2007011026A (en) System and method for foreign code detection.
US7287283B1 (en) Return-to-LIBC attack blocking system and method
US7512768B2 (en) Dynamically sharing a stack between different code segments
WO2006008501A1 (en) Host intrusion prevention system and method
US20070234330A1 (en) Prevention of executable code modification
US20040215911A1 (en) Memory preservation
US20040205354A1 (en) System and method for detecting malicious applications
EP0892955B1 (en) Method and apparatus for protecting data using lock values in a computer system
WO2001061504A1 (en) Protectively operating a processing device with a main protection ring having at main-levels sub-ring levels
US7774843B1 (en) System, method and computer program product for preventing the execution of unwanted code
US7231666B2 (en) Method and apparatus for preventing buffer overflow security exploits
US20050010752A1 (en) Method and system for operating system anti-tampering
US6636919B1 (en) Method for host protection during hot swap in a bridged, pipelined network
US8863159B2 (en) System, method and computer program product for inserting an emulation layer in association with a COM server DLL
JP2005149394A (en) Information processor, information processing method, program and recording medium

Legal Events

Date Code Title Description
AS Assignment

Owner name: INTERNATIONAL BUSINESS MACHINES CORPORATION, NEW Y

Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNORS:ERICKSON, KEVIN J.;KIRKMAN, RICHARD K.;MCCARTHY, PATRICK J.;AND OTHERS;REEL/FRAME:014107/0661;SIGNING DATES FROM 20030318 TO 20030514

FEPP Fee payment procedure

Free format text: PAYOR NUMBER ASSIGNED (ORIGINAL EVENT CODE: ASPN); ENTITY STATUS OF PATENT OWNER: LARGE ENTITY

REMI Maintenance fee reminder mailed
LAPS Lapse for failure to pay maintenance fees
STCH Information on status: patent discontinuation

Free format text: PATENT EXPIRED DUE TO NONPAYMENT OF MAINTENANCE FEES UNDER 37 CFR 1.362

FP Lapsed due to failure to pay maintenance fee

Effective date: 20110220